FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

PostgreSQL -- Prevent unauthorized code execution during pg_dump

Affected packages
postgresql12-client < 12.20
postgresql13-client < 13.16
postgresql14-client < 14.13
postgresql15-client < 15.8
postgresql16-client < 16.4
postgresql12-server < 12.20
postgresql13-server < 13.16
postgresql14-server < 14.13
postgresql15-server < 15.8
postgresql16-server < 16.4

Details

VuXML ID 48e6d514-5568-11ef-af48-6cc21735f730
Discovery 2024-08-08
Entry 2024-08-08

PostgreSQL project reports:

An attacker able to create and drop non-temporary objects could inject SQL code that would be executed by a concurrent pg_dump session with the privileges of the role running pg_dump (which is often a superuser). The attack involves replacing a sequence or similar object with a view or foreign table that will execute malicious code. To prevent this, introduce a new server parameter restrict_nonsystem_relation_kind that can disable expansion of non-builtin views as well as access to foreign tables, and teach pg_dump to set it when available. Note that the attack is prevented only if both pg_dump and the server it is dumping from are new enough to have this fix.

References

CVE Name CVE-2024-7348
URL https://www.postgresql.org/support/security/CVE-2024-7348/